Podcasts

Episode #6: Data Privacy. What is security? What is compliance? What is big brother?

Sheila Jambekar, Chief Privacy Officer at Plaid, and Michael Phillips, Cyber Practice Leader, USA at CFC, discuss the human element at the forefront of security innovations and policies.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Episode #6: Data Privacy. What is security? What is compliance? What is big brother?

The goal of this conversation is to frame privacy risk from a legal/regulatory perspective as well as an operational (privacy engineering) perspective. As security leaders we need to understand that privacy is more than checking a set of compliance boxes. It includes concepts like “privacy by design.” Those ideas embody the regulatory/compliance requirements as specifications to be engineered in to systems. The goal is to create systems that enable “privacy by default.”

On the go? Listen to our podcast on your favorite platforms.

You might also like

Understanding identity-based attacks and how to defend against them

Understanding identity-based attacks and how to defend against them

Breaches used to be primarily carried out via software vulnerabilities: Companies would announce a flaw, take a while to fix it, and attackers would find their way into the system using those exploits. From there they might not only steal information and assets from their primary target, but would also use their access to jump […]

Get ready for threats both old and new in 2025

Get ready for threats both old and new in 2025

It’s prediction season and while no one can see into the future, we can definitely take some educated guesses. From increasingly severe ransomware attacks to deepfakes that deceive Fortune 500 companies, we’re keeping an eye out for some major events in 2025. And while many organizations are taking steps to beef up their defenses, the […]

Contrasting and comparing FAIR with the Resilience solution

Contrasting and comparing FAIR with the Resilience solution

As market awareness of cyber risk quantification grows, we frequently receive questions from clients and curious risk managers about FAIR (Factor Analysis of Information Risk)—what it is, whether it truly provides accurate cyber risk quantification, the effort needed to set it up and maintain, and more. Clients often ask us to compare the FAIR methodology […]

Cyber resiliency starts here.

Request Demo